Search:

Type: Posts; User: shakuni; Keyword(s):

Search: Search took 0.02 seconds.

  1. get geolocation via IP address in google maps, I created this

    Hi everybody

    Yesterday I created this application for a friend, which gets geolocation in google maps via IP address.
    Its here, http://apps.hackingtuts.com

    Although it is very trivial, still...
  2. cellphones!

    cellphones!
  3. How to get info about a person through his phone number

    Just what the title says?
    How to get info about a person through his phone number?
    And please don't answer that I should call him to ask myself.
    I need this info because of a bet with my friend...
  4. Replies
    1
    Views
    4,594

    Case Sensitive Search ?

    Is there any search engine that provide case sensitive searching. I am sure that google searches are not case sensitive.
  5. Replies
    1
    Views
    4,702

    Exotic Malware ?

    For my Malware Research I need samples of the following two kinds of Malware(description from Peter Szor's book). Please give me the names or samples of any of them,




    Thanks.
  6. Replies
    7
    Views
    6,153

    O.K. Charlie.

    O.K. Charlie.
  7. Thread: Pdf To Jpg/bmp

    by shakuni
    Replies
    4
    Views
    2,378

    Actually I am working on a new kind of...

    Actually I am working on a new kind of steganography tool. I can't give you the details of it now but I will post it when it is completed.


    I don't understand this.
  8. Replies
    7
    Views
    6,153

    Yes, "may be" then I can't determine your...

    Yes, "may be" then I can't determine your physical location.
    But I am trying to develop a tool that will find IP from physical location, something like reverse of traceroute. But now I realize that...
  9. Thread: Pdf To Jpg/bmp

    by shakuni
    Replies
    4
    Views
    2,378

    Pdf To Jpg/bmp

    I need to convert pdf to jpg and bmp for some purpose and I want to do it in assembly (or C/C++/ java). Obviously I will have to use some pdf pasing library/SDK. So do you guys know of any good one ?...
  10. Replies
    7
    Views
    6,153

    Geographical info to IP

    I know that the physical location of a computer can be easily determined if we know its IP address.
    What I want to get the is IPs from geographical information alone.
    for instance, I want to know...
  11. Replies
    8
    Views
    6,228

    Accessing "in Use" Files == ?

    How can I access the files that are in use by other processes using win32api ?

    Say there is this file called "locked.txt", which is in use by process A. Now how can I copy this file to another...
  12. Thread: Sources

    by shakuni
    Replies
    8
    Views
    7,366

    Just setup a honepot and you'll get everything...

    Just setup a honepot and you'll get everything that is in the wild.
    Enjoy!
  13. Replies
    1
    Views
    3,742

    Strange Ip Addresses

    My log file told me that a couple of exploits(LSASS and DCOM exploits) were tried on my system's one of the VM (windows xp2) from the following IPs

    10.8.240.93
    10.8.154.135

    But how is this...
  14. Replies
    2
    Views
    5,554

    Win32 Api Creation == ?

    While researching for my book ("Malware : Writing Malicious Code"), I came across this-

    Now my question is-

    How can I emulate an API, for example, How can I write code that'll manipulate...
  15. Replies
    2
    Views
    8,960

    yes it will, actually it just overwrites them....

    yes it will, actually it just overwrites them. But it won't effect the image if the string that is to be hidden is small.
  16. Replies
    2
    Views
    8,960

    Basic Image stegnographer v 0.1

    Basic Image stegnographer v 0.1

    The following source and explanation is a bit oversimplified. But I am still learning about steganography.

    A bitmap contains a header section(first 54 bytes) and...
  17. Thanks for suggestions. I have completed a...

    Thanks for suggestions.
    I have completed a potential chapter list and index of the book.
    I want to make virus writing so easy that it will not be "cool" anymore.The problem is that it will make...
  18. Replies
    6
    Views
    8,433

    injecting browser helper objects remotely =?

    Some system monitoring program gave me this message

    which means that it is executing the function whose name is c which is exported by jkhfd.dll

    I dissassembled the file(jkhfd.dll) and found...
  19. writing a book, "Malware-Writing Malicious Code".

    I read Mark Ludwig's "The Giant Black Book of computer viruses" a few years back. However it is obsolete now and there is no book to fill its place. Although there are good books on writing rootkits,...
  20. Replies
    26
    Views
    20,935

    What's the meaning of "donating" when they aren't...

    What's the meaning of "donating" when they aren't useful for anyone.I throw them in recycle bin.
  21. Replies
    18
    Views
    16,814

    but "a visible window and dialogue boxes" are not...

    but "a visible window and dialogue boxes" are not required to understand the working of some process.One can always start the process inside the kernel level debugger and monitor its behaviour.
  22. Replies
    18
    Views
    16,814

    Can't we get into this "system account" ?

    Can't we get into this "system account" ?
  23. Replies
    18
    Views
    16,814

    "Windows Automatic Update" or a backdoor

    I have four partitions on my computer, say c,d,e and f.Out of these windows is installed on c drive.
    And I have two users on my computer, one is admin and another is InternetUser.I have configured...
  24. Replies
    3
    Views
    4,593

    coding a pdf recovery software

    <history lesson>
    A few days ago I downloaded a book on cryptanalysis in pdf format, it was huge in terms of size (40 MB).
    After downloading it I found that I can't read it because it is corrupt. So...
Results 1 to 24 of 24